Resubmissions

23-11-2024 00:44

241123-a3xw2stkhy 7

23-11-2024 00:40

241123-a1nwcstkd1 10

23-11-2024 00:39

241123-azsg6ayrhq 3

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 00:44

General

  • Target

    download.jpg

  • Size

    8KB

  • MD5

    fd59c3cd5e5088281635eced5c20ccaa

  • SHA1

    9ef4149257a4d39e6624cddc320f59f5eee3798d

  • SHA256

    178ad69c097b6020ffde876881fe38499ca82be6781e7d47988d3422872a1440

  • SHA512

    7ed57054b81b5749fded7622510978c82d2bc50602ca845f20234292130a48bed31afcc4da1da6265d7435d1f46826330a22f33b71e242ab59d77046e6761628

  • SSDEEP

    192:N+wAO7JR1SJBL+n+tiNWVxpzS7CYwPW7NDaMMQOOtk3/aHOSqQcC692pXu:N+wR7JR4JBL++xdQCd+JMSohrCHp+

Malware Config

Signatures

  • Detected potential entity reuse from brand MICROSOFT.
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 36 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\download.jpg
    1⤵
      PID:2228
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault01af4569h313eh4e16hb773h5e4557ccc429
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff9a0b446f8,0x7ff9a0b44708,0x7ff9a0b44718
        2⤵
          PID:2804
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,5235449872472691665,5541178839507738450,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:2
          2⤵
            PID:2572
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,5235449872472691665,5541178839507738450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:5068
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,5235449872472691665,5541178839507738450,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:8
            2⤵
              PID:628
          • C:\Windows\System32\CompPkgSrv.exe
            C:\Windows\System32\CompPkgSrv.exe -Embedding
            1⤵
              PID:4256
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:1436
              • C:\Windows\system32\wwahost.exe
                "C:\Windows\system32\wwahost.exe" -ServerName:App.wwa
                1⤵
                • Checks SCSI registry key(s)
                • Modifies Internet Explorer settings
                • Modifies data under HKEY_USERS
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:4044
              • C:\Windows\system32\AUDIODG.EXE
                C:\Windows\system32\AUDIODG.EXE 0x524 0x514
                1⤵
                  PID:6388

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  c2d9eeb3fdd75834f0ac3f9767de8d6f

                  SHA1

                  4d16a7e82190f8490a00008bd53d85fb92e379b0

                  SHA256

                  1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                  SHA512

                  d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  44ef8eb246ec17855284e9d3a76fee92

                  SHA1

                  abf0d19b1126242944c8e5f7cb1816fbd3b9753c

                  SHA256

                  eb2cfebc40cd05f78f095641bf9fb8d1fed3e8c89cd4d6f99c29fe52b148e934

                  SHA512

                  abb26b4c5276e92119ccefa0d654d64874c4ce2fef6d7642eceb3e68475c7fa0ae422228d2fb0edf2bca079efca5ddcba9a6eb93a52a655b5294c581da90bf1b

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  8KB

                  MD5

                  e663f62cd5724d9b56394168b745a1fc

                  SHA1

                  4d420819e3f4ddfabaab9a75de1f97d871c71f48

                  SHA256

                  c84650b662643ddd6d46524050f0270d6ede4559ed5b3b8eac4491915cfb0e5e

                  SHA512

                  512ffb7ab6edaa8e91d926e2a858bce056ebe2ac6a8737adab72687b3fbca958af177822ac1cbd438a7d9153634068d798281eea08e7b3704a3cee1db8b98ff7

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\AC\INetCache\3T03NVLI\microsoft_logo_564db913a7fa0ca42727161c6d031bef[1].svg

                  Filesize

                  3KB

                  MD5

                  ee5c8d9fb6248c938fd0dc19370e90bd

                  SHA1

                  d01a22720918b781338b5bbf9202b241a5f99ee4

                  SHA256

                  04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

                  SHA512

                  c77215b729d0e60c97f075998e88775cd0f813b4d094dc2fdd13e5711d16f4e5993d4521d0fbd5bf7150b0dbe253d88b1b1ff60901f053113c5d7c1919852d58

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\AC\INetCache\XNKL61BJ\2_11d9e3bcdfede9ce5ce5ace2d129f1c4[1].svg

                  Filesize

                  1KB

                  MD5

                  bc3d32a696895f78c19df6c717586a5d

                  SHA1

                  9191cb156a30a3ed79c44c0a16c95159e8ff689d

                  SHA256

                  0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68

                  SHA512

                  8d4f38907f3423a86d90575772b292680f7970527d2090fc005f9b096cc81d3f279d59ad76eafca30c3d4bbaf2276bbaa753e2a46a149424cf6f1c319ded5a64

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\1C54AUFU\login.live[1].xml

                  Filesize

                  13B

                  MD5

                  c1ddea3ef6bbef3e7060a1a9ad89e4c5

                  SHA1

                  35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                  SHA256

                  b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                  SHA512

                  6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                • memory/4044-2012-0x00000278034E0000-0x00000278035E0000-memory.dmp

                  Filesize

                  1024KB

                • memory/4044-2427-0x000002780B430000-0x000002780B450000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-1127-0x0000027802300000-0x0000027802400000-memory.dmp

                  Filesize

                  1024KB

                • memory/4044-1172-0x000002806FA00000-0x000002806FB00000-memory.dmp

                  Filesize

                  1024KB

                • memory/4044-1966-0x0000027805FA0000-0x0000027805FC0000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-390-0x0000027800080000-0x00000278000A0000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-2011-0x0000027805F80000-0x0000027805FA0000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-2037-0x0000027805F20000-0x0000027805F40000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-2015-0x00000278034E0000-0x00000278035E0000-memory.dmp

                  Filesize

                  1024KB

                • memory/4044-485-0x0000027801100000-0x0000027801200000-memory.dmp

                  Filesize

                  1024KB

                • memory/4044-2474-0x000002806D030000-0x000002806D050000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-4061-0x00000278054F0000-0x0000027805510000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-4070-0x000002806D030000-0x000002806D050000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-4151-0x000002780B960000-0x000002780BA60000-memory.dmp

                  Filesize

                  1024KB

                • memory/4044-4162-0x0000027803720000-0x0000027803740000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-373-0x000002806D7D0000-0x000002806D7F0000-memory.dmp

                  Filesize

                  128KB

                • memory/4044-241-0x000002806D420000-0x000002806D440000-memory.dmp

                  Filesize

                  128KB